Various embodiments are described to enable multiple, independent communication networks to share in an autonomous and dynamic manner unlicensed wireless resources. Generally, this involves determining that a first network node (122) is using at least a portion of a wireless resource to provide network service to at least one remote unit (102). A second network node (123), under the control of a different network operator than the first node and desiring to use the wireless resource, sends the first network node, a request to relinquish use of at least a portion of the wireless resource. The second network node sends this request wirelessly, perhaps using the wireless resource itself. If the first network node grants the request, the second node may then begin using at least a portion of the relinquished resource to provide network service.
|
19. An apparatus for providing wireless services to at least one remote unit via an air interface comprising:
a transceiver;
a processing unit, communicatively coupled to the transceiver, configured to use, via the transceiver, at least a portion of a wireless resource to provide network service to at least one remote unit and configured to wirelessly receive, from a network node via the transceiver, a request for the apparatus to relinquish use of at least a portion of the wireless resource, wherein the request for the apparatus is received based on detecting an overload condition at the network node, wherein the network node uses at least a portion of the relinquished wireless resource to provide network service to at least one remote unit, and wherein the network node is under control of a different network operator than the apparatus;
a controller that is configured to, in response to receipt of the request, set a timer;
wherein the processing unit is configured to, in response to expiration of the timer, relinquish use of at least a portion of the wireless resource.
18. A network node that provides wireless services to at least one remote unit via an air interface comprising:
a transceiver;
a processing unit, communicatively coupled to the transceiver, configured to determine, via the transceiver, that another network node is using at least a portion of a wireless resource to provide network service to at least one remote unit and configured to wirelessly send, to the other network node via the transceiver, a request for the other network node to relinquish use of at least a portion of the wireless resource, wherein the network node uses at a least portion of the relinquished wireless resource to provide network service to at least one remote unit, wherein the other network node is under control of a different network operator than the network node and wherein wirelessly sending the request for the network node to relinquish use comprises sending, via an uplink portion of the wireless resource, the request for the network node to relinquish use of at least a portion of the wireless resource in response to detecting that an overloaded condition is present at the other network node.
12. A method for a plurality of communication networks that include a plurality of network nodes which provide wireless services to at least one remote unit via an air interface, to dynamically share wireless resources comprising:
using, by a first network node of the plurality of network nodes, at least a portion of a wireless resource to provide network service to at least one remote unit;
wirelessly receiving, by the first network node from a second network node of the plurality of network nodes, a request for the first network node to relinquish use of at least a portion of the wireless resource, wherein the request is received at the first network node based on detecting an overload condition at the second network node, wherein the second network node uses at least a portion of the relinquished wireless resource to provide network service to at least one remote unit, and wherein the second network node is under control of a different network operator than the first network node;
in response to receiving the request, setting a timer;
in response to expiration of the timer, relinquishing use of at least a portion of the wireless resource.
1. A method for a plurality of communication networks that include a plurality of network nodes which provide wireless services to at least one remote unit via an air interface, to dynamically share wireless resources comprising:
determining that a first network node of the plurality of network nodes is using at least a portion of a wireless resource to provide network service to at least one remote unit;
wirelessly sending, by a second network node of the plurality of network nodes to the first network node, a request for the first network node to relinquish use of at least a portion of the wireless resource, wherein the second network node uses at least a portion of the relinquished wireless resource to provide network service to at least one remote unit, wherein the second network node is under control of a different network operator than the first network node and wherein wirelessly sending the request for the first network node to relinquish use comprises sending, via an uplink portion of the wireless resource, the request for the first network node to relinquish use of at least a portion of the wireless resource in response to detecting that an overloaded condition is present at the second network node.
2. The method of
monitoring each sub-channel of the wireless resource to determine what network node may be using each sub-channel, wherein the wireless resource comprises a frequency band.
3. The method of
monitoring a control header of each sub-channel of the wireless resource, wherein the control header of each sub-channel being used in the wireless resource comprises at least one of:
a network node identifier,
a network identifier, and
a network operator identifier.
4. The method of
selecting the first network node from a plurality of network nodes based on a total number of sub-channels of the wireless resource being used by network nodes associated with a first network operator,
wherein the first network node is associated with the first network operator and
wherein each of the plurality of network nodes are determined to be using at least one sub-channel of the wireless resource to provide network service.
5. The method of
receiving, by the second network node from the first network node, signaling indicating that the first network node relinquishes use of at least a portion of the wireless resource.
6. The method of
sending, by the second network node to the first network node, an indication of a loading condition being experienced by the second network node.
7. The method of
8. The method of
monitoring the set of frequency bands to determine which predefined frequency hopping patterns of a plurality of predefined frequency hopping patterns is being used by network nodes to provide network service.
9. The method of
selecting the first network node from a plurality of network nodes based on which network operator the first network node is associated with,
wherein each of the plurality of network nodes are determined to be using a predefined frequency hopping pattern of the plurality of predefined frequency hopping patterns.
10. The method of
sending, via an uplink random access portion of the wireless resource, a request for the first network node to relinquish use of the wireless resource.
11. The method of
determining, by the second network node, that the first network node is no longer using the wireless resource;
using, by the second network node, the wireless resource determined to be relinquished by the first network node to provide network service to at least one remote unit.
13. The method of
sending, by the first network node to the second network node, signaling indicating that the first network node relinquishes use of at least a portion of the wireless resource.
14. The method of
sending, by the first network node to the second network node, signaling indicating that the first network node denies the request to relinquish use of at least a portion of the wireless resource.
15. The method of
sending, by the first network node to the second network node, an indication of a loading condition being experienced by the first network node.
16. The method of
17. The method of
indicating, by the first network node to a network controller, that the request for the first network node to relinquish use of the wireless resource was received;
receiving, by the first network node from the network controller, an instruction to release the wireless resource;
ceasing, by the first network node in response to the instruction, to use the wireless resource.
20. The apparatus of
|
The present invention relates generally to communication systems and, in particular, to sharing wireless resources among different communication networks dynamically.
In the United States and elsewhere, WiMAX (Worldwide Interoperability for Microwave Access)-based systems are being designed and developed for operation in licensed bands, such as 2.3 GHz, 2.5 GHz, 3.3 GHz, 3.5 GHz etc. However, depending on the country and the specific band, it is likely the spectrum will be subject to licensing in only densely populated areas (urban or suburban environments). In rural areas, a licensing regime may not be attractive to offer a viable business case for potential WiMAX operators due to the cost of licensing spectrum and limited potential revenues from a sparse population of users. In some countries, the spectrum available for broadband wireless may be limited and insufficient to grant licenses to the many potential operators aspiring to offer service. Countries eager to enable operators to provide wireless communication service to their population are in the process of making spectrum available for use on an unlicensed basis. Thus, situations in which multiple operators would compete to provide service using the same unlicensed spectrum are both foreseeable and actually being encouraged.
Therefore, it would be desirable to have a method and apparatus that enables multiple communication networks to share in a dynamic manner unlicensed wireless resources.
Specific embodiments of the present invention are disclosed below with reference to
Simplicity and clarity in both illustration and description are sought to effectively enable a person of skill in the art to make, use, and best practice the present invention in view of what is already known in the art. One of skill in the art will appreciate that various modifications and changes may be made to the specific embodiments described below without departing from the spirit and scope of the present invention. Thus, the specification and drawings are to be regarded as illustrative and exemplary rather than restrictive or all-encompassing, and all such modifications to the specific embodiments described below are intended to be included within the scope of the present invention.
Various embodiments are described to enable multiple, independent communication networks to share in an autonomous and dynamic manner unlicensed wireless resources. Generally, this involves determining that a first network node is using at least a portion of a wireless resource to provide network service to at least one remote unit. A second network node, under the control of a different network operator than the first node and desiring to use the wireless resource, sends the first network node, a request to relinquish use of at least a portion of the wireless resource. The second network node sends this request wirelessly, perhaps using the wireless resource itself. If the first network node grants the request, the second node may then begin using at least a portion of the relinquished resource to provide network service.
The disclosed embodiments can be more fully understood with reference to
Communication system 100 is depicted in a very generalized manner. For example, system 100 is shown to simply include two different networks, one being operator 1's network (depicted by network components 121, 122 and 141) and the other being operator 2's network (depicted by network components 123, 124 and 142). Network nodes 121-124 are shown providing network service to remote units 101-104 using wireless interfaces 111-114, respectively. Wireless interfaces 111-114 are in accordance with the particular access technology supported by each respective network node. For example, they may all utilize the same technology such as one based on IEEE 802.16, or they may utilize different access technologies. Those skilled in the art will recognize that
For example,
Thus, given a high-level description, an algorithm, a logic flow, a messaging/signaling flow, and/or a protocol specification, those skilled in the art are aware of the many design and development techniques available to implement a processing unit that performs the given logic. Therefore, devices 122 and 123 represent known devices that have been adapted, in accordance with the description herein, to implement multiple embodiments of the present invention. Furthermore, those skilled in the art will recognize that aspects of the present invention may be implemented in and across various physical components and none are necessarily limited to single platform implementations. For example, a network node may be implemented in or across one or more RAN components, such as a base transceiver station (BTS) and/or a base station controller (BSC), a Node-B and/or a radio network controller (RNC), or an HRPD AN and/or PCF, or implemented in or across one or more access network (AN) components, such as an access service network (ASN) gateway and/or ASN base station (BS), an access point (AP), a wideband base station (WBS), and/or a WLAN (wireless local area network) station.
Remote units 101-104 and network nodes 121-124 are shown communicating via technology-dependent, wireless interfaces. Remote units, subscriber stations (SSs) or user equipment (UEs), may be thought of as mobile stations (MSs), mobile subscriber stations (MSSs) or mobile nodes (MNs). In addition, remote unit platforms are known to refer to a wide variety of consumer electronic platforms such as, but not limited to, mobile stations (MSs), access terminals (ATs), terminal equipment, mobile devices, gaming devices, personal computers, and personal digital assistants (PDAs). In particular, remote units 101-104 each comprise a processing unit (not shown) and transceiver (not shown). Depending on the embodiment, any of remote units 101-104 may additionally comprise a keypad (not shown), a speaker (not shown), a microphone (not shown), and a display (not shown). Processing units, transceivers, keypads, speakers, microphones, and displays as used in remote units are all well-known in the art.
Operation of embodiments in accordance with the present invention occurs substantially as follows, first with reference to
Processing unit 132 via transceiver 134 determines that network node 122 is using at least a portion of the wireless resource utilized by wireless interface 112 to provide network service to remote units, such as remote unit 102. Processing unit 132, via transceiver 134 and wireless interface 112, may send a request for network node 122 to relinquish use of at least a portion of the wireless resource network node 122 is using to provide network service. Processing unit 131 receives this request via transceiver 133 and may or may not stop using at least a portion of the wireless resource. If network node 122 relinquishes at least a portion of the wireless resource, then processing unit 132 via transceiver 134 may begin using at least a portion of the relinquished resource. Thus, operator 2 may then be able to provide network service via network node 123 and wireless interface 113 (utilizing at least a portion of the relinquished wireless resource) to remote units such as remote unit 103.
The process of determining whether or not to grant the request varies from one embodiment to the next. Different embodiments may strive to achieve different degrees of fairness among operators who are contending for the same wireless resources, and/or different embodiments may use different rules or techniques to achieve a particular degree of fairness. Whether the request is granted may also depend on the particular number of operators contending, the relative number of resources each operator's network is presently using, the current loading condition (e.g., an overloaded condition verses a lightly loaded condition) of particular network nodes, the history of resource usage and/or sharing history between operators, a degree of randomness, etc.
For example,
Logic flow 200 begins (201) with a network node monitoring (203) each sub-channel of a wireless resource to determine what network node may be using each sub-channel. The network node selects (205) one or more network nodes from the set of network nodes that were determined to be using at least one sub-channel of the wireless resource. This selection may be based on the total number of sub-channels being used by the network nodes associated with a certain network operator (e.g., the network operator with the highest total number of sub-channels). The network node then wirelessly requests (207) the selected nodes to relinquish use of the sub-channels that they are using. For example, this request may be sent wirelessly via the sub-channels used by the selected nodes. When the network node receives (209) signaling indicating that one or more selected network nodes is relinquishing the use of their sub-channels, the network node may then begin (211) to use the relinquished sub-channels to provide network service. Logic flow 200 thus ends (213).
Logic flow 300 begins (301) with a network node monitoring (303) a set of frequency bands to determine which predefined frequency hopping patterns are being used by which other nodes. The network node selects (305) nodes from the set of network nodes that are using at least one of the frequency hopping patterns. For example, for each network operator represented in the set of network nodes, one node may be selected. The network node then wirelessly requests (307) the selected nodes to relinquish use of the frequency hopping patterns that they are using. For example, this request may be sent wirelessly via an uplink portion of the wireless resource used by each of the selected nodes. The network node then waits for a response to its requests. In some embodiments, it may get an implicit response when the network node determines (309) that a selected network node is no longer using its frequency hopping pattern. In this case, the network node may then begin (311) to use the relinquished frequency hopping pattern to provide network service. Logic flow 300 thus ends (313). In other embodiments, the network node may receive explicit signaling indicating that the requested resource (frequency hop pattern) has been relinquished.
While
Suppose we are given N MHz of unlicensed spectrum between X and (X+N) MHz. (e.g., N=40 MHz and X=3600 MHz). Unlicensed means no operator can claim ownership of the entire band or sub-bands on a permanent basis. Instead, anyone who deploys a system is expected to behave according to some loosely defined criteria or etiquette of operation. For the purpose of description, consider the available spectrum is divided into sub-channels. In the example below, we assume that the 40 MHz channel is divided into NO_OF_CHANNELS (=32) sub-channels of 1.25 MHz each.
With unlicensed mode of operation, each of the sub-channels is initially not assigned to any operator. Subsequently, as an operator wants to start offering service in a given region, the initial task is to assess what sub-channels are available for occupation and may be used for offering communication service. Being an unlicensed system, an operator is not allowed to monopolize the use of available spectrum nor permanently “own” any portion of the spectrum. Instead, the embodiment described in the steps below provides for sharing within the spectral band in a manner that allows the total spectrum band to be used and shared fairly.
Initially, there are no operators. The whole spectrum is available and divided into 32 sub-channels as shown below. Operator 1 arrives on the scene and claims all 32 sub-channels. Operator 2 then arrives on the scene, senses the presence of Operator 1 and claims half the sub-channels from Operator 1.
Operator 3 then arrives on the scene. It senses the presence of Operator 1 and Operator 2. Operator 3 will determine that the fair share of bandwidth it is entitled to is: 32/3˜10 sub-channels. It will start requesting its neighbors, Operators 1 and 2, to relinquish bandwidth. The neighbors initially have occupied 16 sub-channels until arrival of Operator 3. They will oblige to the request from Operator 3 by giving up their bandwidth until they reach their fair share. For example, Operator 1 may give up 6 sub-channels and Operator 2 may give up 4 sub-channels. The end result is the following split: Operators 1, 2 and 3 will have 10, 12 and 10 sub-channels, respectively.
Operator 4 then arrives on the scene. It senses the presence of Operator 1 and Operator 2. However, Operator 4 is physically located such that it is not in the radio vicinity of Operator 3. Thus, Operator 4 will determine the fair share of bandwidth it is entitled to is: 32/3˜10 sub-channels. Before it starts requesting its neighbors to relinquish bandwidth, it will first detect what sub-channels are not being used by its neighbor operators. In this case, it will detect 10 sub-channels are not occupied by Operators 1 and 2. Therefore, Operator 4 will use these 10 sub-channels and has no need to request bandwidth from any of its neighbors.
Additional Comments:
Note that the mechanism described above enables bandwidth to be made available where it could be utilized to serve users (congestion relief by temporary transfer of bandwidth from lightly load to heavily loaded BS/AP).
An additional mechanism may be built-in to ensure that there is no ping-pong effect of frequent back and forth transfer of bandwidth between two neighbor BS/APs. This may be accomplished by building a minimum time interval that must elapse before a donor BS/AP can ask for bandwidth from a borrower BS/AP to whom bandwidth was previously donated.
Transfer of bandwidth from a lightly loaded BS (based on recent traffic condition) is for a temporary duration and may lead an operator to function with less than his fair share of bandwidth. If the traffic in the donor operator increases, then the bandwidth that was lent by a lightly loaded BS will be reclaimed from the borrower BS by asking it to relinquish what was borrowed from the lightly loaded BS. Thus, robust mechanisms may be built in to provide self-regulation and self-adjustment with respect to the traffic and load conditions.
Another Detailed Embodiment will now be Described:
Suppose we are given N MHz of unlicensed spectrum between X and (X+N) MHz. (e.g. N=50 MHz and X=3650 MHz). The description below applies for different choices of X and N. Unlicensed means no operator can claim ownership of the band or sub-bands on a permanent basis. Instead, anyone who deploys a system is expected to behave according to some loosely defined criteria or etiquette of operation.
Next we outline a high level design for operation in unlicensed bands. Suppose we divide the available spectrum of 50 MHz into 10 sub-bands each 5 MHz width. Let the frequencies be denoted as: f1, f2, f3, f4, f5, f6, f7, f8, f9, f10. We will assume a slow frequency hopping (FH) mode of operation as follows.
f1→f2→f3→f4→f5→f6→f7→f8→f9→f10
Each Base Station belongs to a specific provider or operators with a unique operator identifier. Associated with each operator's network is a functional entity called Network Central Controller (NCC) that keeps track of number of Base Stations that belongs to the operator. See for example,
When a second Base Station 2 is installed and turned on, it first monitors the environment and determines if there is any other Base Station in its neighborhood (sense the environment in order to follow a etiquette). If no BS is detected, it chooses one of the FH patterns at random, and starts hopping and operating—ready to associate remote units and grant bandwidth request etc. If one or more BS stations are detected in the neighborhood, the new Base Station will monitor what FH patterns are being used. Then after sufficient monitoring, the new Base Station will pick an unused FH pattern (from the list of published FH patterns) and then start hopping according to the chosen pattern. Up to 10 Base Stations that are in proximity of each other can operate in frequency hopping mode without interfering with each other as long as they hop in sync with each other (use the same amount of time for their hopping duration at any given frequency). 10 BSs is believed to be a sufficiently large number for deployment in a rural area and that can operate without causing interference with each other.
Operation of the present detailed embodiment is described in the following steps:
Note other variations of some steps outlined above are possible to realize this embodiment in practice. For instance, after step 11, when a frequency hopping channel is relinquished by a base station, it is possible that more than one nBS is waiting to grab a channel (perhaps an unlikely but a theoretically possible event). Thus, the implementation should bias the selection process of who gets the new channel first.
Suppose there are two operators X and Y that are both interested in adding a base station to their networks. Let operator X and Y have N(X) and N(Y) base stations currently in operation. When a frequency hopping channel becomes available, each Base Station will wait an additional number of frequency hop durations before grabbing the frequency hop channel, assuming it is still free. The number of additional hops that a new base station of operator X may wait =(10*N(X)+r.v.) where r.v. is a random variable chosen uniformly randomly between <−4, +4>. This scheme will bias the selection process in favor of operator with fewer base station to grab the frequency hop channel first. The new Base Station of the operator that failed to get a frequency hopping channel will revert back to the original process of hunting for a free channel as outlined above.
One of skill in the art will appreciate that various modifications and changes may be made to the specific embodiments described above with respect to
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments of the present invention. However, the benefits, advantages, solutions to problems, and any element(s) that may cause or result in such benefits, advantages, or solutions, or cause such benefits, advantages, or solutions to become more pronounced are not to be construed as a critical, required, or essential feature or element of any or all the claims.
As used herein and in the appended claims, the term “comprises,” “comprising,” or any other variation thereof is intended to refer to a non-exclusive inclusion, such that a process, method, article of manufacture, or apparatus that comprises a list of elements does not include only those elements in the list, but may include other elements not expressly listed or inherent to such process, method, article of manufacture, or apparatus. The terms a or an, as used herein, are defined as one or more than one. The term plurality, as used herein, is defined as two or more than two. The term another, as used herein, is defined as at least a second or more. Unless otherwise indicated herein, the use of relational terms, if any, such as first and second, and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The terms including and/or having, as used herein, are defined as comprising (i.e., open language). The term coupled, as used herein, is defined as connected, although not necessarily directly, and not necessarily mechanically. Terminology derived from the word “indicating” (e.g., “indicates” and “indication”) is intended to encompass all the various techniques available for communicating or referencing the information or object being indicated. Some, but not all examples of techniques available for communicating or referencing the information or object being indicated include the conveyance of the information or object being indicated, the conveyance of an identifier of the information or object being indicated, the conveyance of information used to generate the information or object being indicated, the conveyance of some part or portion of the information or object being indicated, the conveyance of some derivation of the information or object being indicated, and the conveyance of some symbol representing the information or object being indicated. The terms program, computer program, and computer instructions, as used herein, are defined as a sequence of instructions designed for execution on a computer system. This sequence of instructions may include, but is not limited to, a subroutine, a function, a procedure, an object method, an object implementation, an executable application, an applet, a servlet, a shared library/dynamic load library, a source code, an object code and/or an assembly code.
Natarajan, Kadathur S., Coombes, Daniel J., Payne, III, William A
Patent | Priority | Assignee | Title |
10419360, | May 31 2007 | KYNDRYL, INC | Market-driven variable price offerings for bandwidth-sharing ad hoc networks |
10529012, | May 31 2007 | KYNDRYL, INC | System and method for fair-sharing in bandwidth sharing ad-hoc networks |
10560872, | May 31 2007 | KYNDRYL, INC | Price offerings for bandwidth-sharing ad hoc networks |
10594623, | May 31 2007 | KYNDRYL, INC | Market-driven variable price offerings for bandwidth-sharing ad hoc networks |
10623998, | May 31 2007 | KYNDRYL, INC | Price offerings for bandwidth-sharing ad hoc networks |
10674524, | Nov 14 2015 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Adjusting transmission parameters to support coexistence fairness |
11083042, | Dec 30 2019 | MOTOROLA SOLUTIONS, INC | Multiple mode push-to-X group calls on long term evolution networks |
11496410, | May 31 2007 | KYNDRYL, INC | Market-driven variable price offerings for bandwidth-sharing ad hoc networks |
11665774, | Dec 30 2019 | MOTOROLA SOLUTIONS, INC. | Multiple mode push-to-X group calls on long term evolution networks |
8792900, | Sep 23 2010 | Nokia Technologies Oy | Autonomous unlicensed band reuse in mixed cellular and device-to-device network |
9331904, | May 31 2007 | KYNDRYL, INC | Formation and rearrangement of lender devices that perform multiplexing functions |
9578538, | May 31 2007 | KYNDRYL, INC | Formation and rearrangement of ad hoc networks |
9710039, | Jul 17 2014 | International Business Machines Corporation | Calculating expected maximum CPU power available for use |
9710040, | Jul 17 2014 | International Business Machines Corporation | Calculating expected maximum CPU power available for use |
9992021, | Mar 14 2013 | goTenna, Inc. | System and method for private and point-to-point communication between computing devices |
Patent | Priority | Assignee | Title |
5862487, | Jan 25 1995 | NTT Mobile Communications Network Inc | Channel allocation for co-located systems based on interferring channel groups |
6148003, | Sep 18 1996 | U.S. Philips Corporation | Information distribution system |
20020136187, | |||
20030014488, | |||
20030153339, | |||
20030181213, | |||
20040024879, | |||
20040032843, | |||
20040176122, | |||
20050254510, | |||
20060148482, | |||
20070213069, | |||
20070287464, | |||
20080089279, | |||
20080268858, | |||
WO3081848, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 08 2007 | Motorola Mobility LLC | (assignment on the face of the patent) | / | |||
Mar 29 2007 | COOMBES, DANIEL J | Motorola, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019104 | /0198 | |
Apr 03 2007 | NATARAJAN, KADATHUR S | Motorola, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019104 | /0198 | |
Apr 03 2007 | PAYNE, WILLIAM A , III | Motorola, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019104 | /0198 | |
Jul 31 2010 | Motorola, Inc | Motorola Mobility, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 025673 | /0558 | |
Jun 22 2012 | Motorola Mobility, Inc | Motorola Mobility LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 028829 | /0856 | |
Oct 28 2014 | Motorola Mobility LLC | Google Technology Holdings LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 034500 | /0001 |
Date | Maintenance Fee Events |
Feb 13 2017 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Apr 05 2021 | REM: Maintenance Fee Reminder Mailed. |
Sep 20 2021 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Aug 13 2016 | 4 years fee payment window open |
Feb 13 2017 | 6 months grace period start (w surcharge) |
Aug 13 2017 | patent expiry (for year 4) |
Aug 13 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 13 2020 | 8 years fee payment window open |
Feb 13 2021 | 6 months grace period start (w surcharge) |
Aug 13 2021 | patent expiry (for year 8) |
Aug 13 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 13 2024 | 12 years fee payment window open |
Feb 13 2025 | 6 months grace period start (w surcharge) |
Aug 13 2025 | patent expiry (for year 12) |
Aug 13 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |